Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Exploit Analysis: search_path Hijacking (The Hidden PostgreSQL Attack)
Cover image for Exploit Analysis: search_path Hijacking (The Hidden PostgreSQL Attack)

Exploit Analysis: search_path Hijacking (The Hidden PostgreSQL Attack)

Comments
2 min read
Securing Middleware: The Express.js Static Analysis Standard
Cover image for Securing Middleware: The Express.js Static Analysis Standard

Securing Middleware: The Express.js Static Analysis Standard

Comments
3 min read
Applying CIS Hardening for Linux Servers Using Ansible Automation

Applying CIS Hardening for Linux Servers Using Ansible Automation

Comments
4 min read
CVE-2025-55182: How React’s Biggest Vulnerability Happened — and What It Teaches Us About Modern Web Security
Cover image for CVE-2025-55182: How React’s Biggest Vulnerability Happened — and What It Teaches Us About Modern Web Security

CVE-2025-55182: How React’s Biggest Vulnerability Happened — and What It Teaches Us About Modern Web Security

2
Comments
3 min read
VPN Log Analyzer: Detect Brute Force, Session Hijacking & Credential Stuffing (100 Tests) 🔐

VPN Log Analyzer: Detect Brute Force, Session Hijacking & Credential Stuffing (100 Tests) 🔐

Comments
8 min read
Zero-Trust Auth: The JWT Static Analysis Standard
Cover image for Zero-Trust Auth: The JWT Static Analysis Standard

Zero-Trust Auth: The JWT Static Analysis Standard

Comments
3 min read
Frontend Protection: The Browser Static Analysis Standard
Cover image for Frontend Protection: The Browser Static Analysis Standard

Frontend Protection: The Browser Static Analysis Standard

Comments
2 min read
Runtime Security at Scale: The Node.js Static Analysis Standard
Cover image for Runtime Security at Scale: The Node.js Static Analysis Standard

Runtime Security at Scale: The Node.js Static Analysis Standard

Comments
2 min read
Hacking the Gridlock: AI's Fight Against Silent Traffic Attacks

Hacking the Gridlock: AI's Fight Against Silent Traffic Attacks

Comments
2 min read
How to Add Audit Logs to Your App (The Complete Guide for Developers)

How to Add Audit Logs to Your App (The Complete Guide for Developers)

Comments
3 min read
Data Integrity & Anti-Cheating

Data Integrity & Anti-Cheating

Comments
3 min read
Server headers that talk too much

Server headers that talk too much

Comments
1 min read
Mithridatium: An Open-Source Toolkit for Verifying the Integrity of Pretrained Machine Learning Models
Cover image for Mithridatium: An Open-Source Toolkit for Verifying the Integrity of Pretrained Machine Learning Models

Mithridatium: An Open-Source Toolkit for Verifying the Integrity of Pretrained Machine Learning Models

2
Comments
2 min read
Agent Security Explained By Dawn Song
Cover image for Agent Security Explained By Dawn Song

Agent Security Explained By Dawn Song

Comments
3 min read
Security news weekly round-up - 12th December 2025
Cover image for Security news weekly round-up - 12th December 2025

Security news weekly round-up - 12th December 2025

2
Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.